RSI Security

How HITRUST Regulates Risk Management in the Healthcare Indusry

One of the greatest perils the healthcare community must confront involves the ever-present danger of major information security threats. To make matters worse, these are not stagnant hazards; rather, they’re continuously shifting and evolving in response to each newly erected digital moat, palisade, or bulwark. So, as the industry’s information communication technology [ICT] infrastructure becomes more complex and sophisticated, so too do the malicious programs and people seeking entrance into such systems. 

Fortunately, defensive systems and protocols have been raised in order to ward off the hoards of 21st-century barbarians. Chief amongst these measures is HITRUST, which has become the industry standard for regulating and mitigating risk. But what are the major cybersecurity risks in healthcare and how does HITRUST help prevent them

Read on to discover the answers to these questions and more!  

 

Cyber Security Risks in Healthcare

Over the past two decades, cybercriminal activity has continued to grow exponentially, becoming the fastest growing criminal activity in the United States. In fact, according to Cybersecurity Ventures:

Cybercrime is the greatest threat to every company in the world, and one of the biggest problems with mankind. The impact on society is reflected in the numbers. Last year, Cybersecurity Ventures predicted that cybercrime will cost the world $6 trillion annually by 2021, up from $3 trillion in 2015. This represents the greatest transfer of economic wealth in history, risks the incentives for innovation and investment, and will be more profitable than the global trade of all major illegal drugs combined.

Unsurprisingly, the healthcare industry has become the prime target of cyberattacks. With its relatively recent transition from physical record-keeping to digital (in accordance with HIPAA’s mandates), healthcare providers and organizations have had to learn the digital landscape on the fly. As you might imagine, this was a messy transition, mistakes were made and breaches occurred frequently. 

 

Assess your HITRUST compliance

 

One particular problem with the gradual HIPAA rollout was that, until the additions of HITECH and HITRUST, there were few mechanisms and prescriptive compliance programs for ensuring the safety of the private health data. This resulted in almost every healthcare system having glaring security vulnerabilities or practicing unsound policies. The Sixth Annual Benchmark Study on Privacy and Security of Healthcare Data by the Ponemon Institute found that, in 2016, the healthcare industry was the most attacked by cybercriminals of any industry. Important findings include:

 

 

 

 

 

The Costs of Breaches 

Naturally, your first thought regarding the costs of a security breach might just involve the monetary cost, which is substantial but fail to paint the entire picture. A data breach in the healthcare industry can have severe ramifications, so it’s helpful to split the costs into one of three categories in order to gain a better understanding of how serious an information breach can be. Typically these costs are: 

 

 

 

The Most Common Cyber Security Risks in Healthcare

Although there are a variety of threats that any healthcare organization will face, there are some common ones that your business should be aware of. These include: 

According to the previously mentioned Ponemon Institute study, “when healthcare organizations were asked what type of security incident worries them most, by far it is the negligent or careless employee (69 percent of respondents). Forty-five percent of respondents say it is cyber attackers and 30 percent say it is the use of insecure mobile devices. These findings are virtually unchanged since 2015. Insecure medical devices and system failures are the least problematic (9 percent and 13 percent of respondents, respectively).” 

 

 

 

 

As people have shifted to using their mobile devices at an increasingly larger rate, hackers have sought to step up their game by tailoring phishing scams to mobile devices. In fact, “Mobile users are at the greatest risk of falling for it because of the way many mobile email clients display only a sender’s name — making it especially easy to spoof messages and trick a person into thinking an email is from someone they know or trust.”

 

The main risk is a breach, and part of the beauty of the cloud from an adversary perspective is that they don’t need to spend reconnaissance time looking at on-premises components. We now get into a situation of how to monitor traffic and data to and from the cloud. It takes a lot more effort to defend that terrain than it does for them to attack it — the advantage is tipped in their favor, and I don’t think that’s going away.

 

 

 

 

How HITRUST Regulates Risk Management in the Healthcare Industry

HITRUST, the Health Information Trust Alliance, has long been the foremost data protection standards development and certification organization in the world of healthcare. It was the very first body to put together a prescriptive set of security standards, procedures, and actions in response to HIPAA and the threat of data intrusion. The organization compiled the Common Security Framework [CSF], which harmonizes various other compliance frameworks such as:

Together, these controls and actions help prevent common cybersecurity problems. 

RELATED ARTICLE: How Do HITRUST and NIST Work Together in Data Protection?

 

The CSF Framework

In order to properly cover such an expansive framework, the CSF was divided in 19 primary domains:

  1. Access Control
  2. Audit Logging & Monitoring
  3. Business Continuity & Disaster Recovery
  4. Configuration Management
  5. Data Protection & Privacy
  6. Education, Training & Awareness
  7. Endpoint Protection
  8. Incident Management
  9. Information Protection Program
  10. Mobile Device Security
  11. Network Protection
  12. Password Management
  13. Physical & Environmental Security
  14. Portable Media Security
  15. Risk Management
  16. Third-Party Security
  17. Transmission Protection
  18. Vulnerability Management
  19. Wireless Protection

Within these 19 domains are 135 specific controls meant to reduce a healthcare company’s cybersecurity risks. So, in order to be HITRUST CSF certified, your business must pass three separate Degrees of Assurance, demonstrating compliance with each and every one of the 135 controls. These three tiers are:

 

 

 

Even after CSF Certification, your business isn’t done with the audits. Since the cybersecurity and technology world are continuously shifting, you will need to adapt to updates or changes. In fact, you will need to perform an audit every year to continue to retain that certification. Fortunately, the process will be faster and less costly since you will already be in compliance in most facets. As a result, only small remediation shifts or movements will likely be necessary. 

 

HITRUST Threat Catalogue

In recent years, in order to add even greater oversight and risk management mechanisms, HITRUST announced the creation of a Threat Catalogue. This was intended to help create visibility on new, current, or future threats, and to align them with the HITRUST CSF risk factors and controls. According to HITRUST, the Threat Catalogue was created to perform for primary tasks:

  1. Identify and leverage an existing threat taxonomy for common adversarial and non-adversarial threats to ePHI

  2. Enumerate all reasonably anticipated threats to ePHI for a general healthcare organization

  3. Map HITRUST CSF control requirements to the enumerated threats

  4. Identify any additional information needed in future iterations of the HITRUST Threat Catalogue to help meet its objectives

 

 

Managing Your Cyber Security Risks

A data breach, even a small one, could potentially cost you millions of dollars and large swaths of your clientele. Therefore, it’s crucial that you educate your employees and take all the proper measures as outlined in HITRUST. There are far too many cybersecurity risks in healthcare to handle on your own. You need help. That’s where we come in. 

At RSI Security, our goal is to help your healthcare organization navigate the tricky roads of cybersecurity and HIPAA compliance. We work with you to mitigate risks, improve your security, and attain HITRUST CSF certification. So, if you want to protect your business, partner with us and together we will begin to shore up your digital defenses and decrease your risks across every facet of your digital terrain. 

 

 


Download Our HITRUST Compliance Checklist

Assess where your organization currently stands with being HITRUST compliant by completing this checklist. Upon filling out this brief form you will receive the checklist via email.

 


Sources

Morgan, S. Cybersecurity Ventures. Cybercrime Damages $6 Trillion By 2021. (2017). https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/

Ponemon Institute. Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data. (2016). https://www.ponemon.org/local/upload/file/Sixth%20Annual%20Patient%20Privacy%20%26%20Data%20Security%20Report%20FINAL%206.pdf

NEJM Catalyst. Using it or Losing It? (2017). https://catalyst.nejm.org/case-data-scientists-inside-health-care/

Drolet, M. CSO. The Rise of Mobile Phishing Attacks and How to Combat Them. (2018). https://www.csoonline.com/article/3268109/the-rise-of-mobile-phishing-attacks-and-how-to-combat-them.html

Eddy, N. Healthcare IT News. 5 Cybersecurity Threats Healthcare Faces in 2019 and Beyond. (2019). https://www.healthcareitnews.com/news/5-cybersecurity-threats-healthcare-faces-2019-and-beyond

HITRUST. HITRUST Threat Catalogue Advances Healthcare Industry Cyber Risk Management, Improves Effectiveness of Organizational Risk Analyse. (2018). https://hitrustalliance.net/hitrust-threat-catalogue-advances-healthcare-industry-cyber-risk-management-improves-effectiveness-organizational-risk-analyses/

Exit mobile version